It's not likely we'll succumb to Bieber Fever. We're of a generation more susceptible to the Rockin' Pneumonia and the Boogie Woogie Flu. But a company that ran official fan websites for pop stars may be feeling the effects of an FTC law enforcement action alleging violations of the Children's Online Privacy Protection Act and COPPA Rule.
For most consumers, the scam started with a disturbing phone call. We’re from Microsoft (or Dell or Norton or McAfee), the “tech support” person on the line said, and we’ve detected a serious problem with your computer. To underscore the need for immediate action, the caller directed people to a particular location on their computers and claimed that the presence of certain files — often accompanied by red Xs, yellow triangles, and other ominous features — was proof that their computers were riddled with malware and in imminent danger of crash
If you make environmental claims in your marketing or have clients who do, today’s the day you’ve been waiting for: the release of the FTC’s revised Guides for the Use of Environmental Marketing Claims — the Green Guides. In the next few weeks, we’ll follow up with blog posts going into detail about what’s new, what’s changed, and what’s stayed the same. But here’s our suggested TO DO list to help you get started.
The charges outlined in the FTC’s lawsuits against a software business and seven rent-to-own companies are surprising — and OK, some might say a little creepy. Software on rented computers gave the companies the ability to hit the kill switch if people were behind on their payments. But according to the complaints, it also let them collect sensitive personal information, grab screen shots, and take webcam photos of people in
Paranoid delusion from 80s R&B artist Rockwell? Not necessarily, if he had used a computer from a rent-to-own store. Because according to lawsuits filed by the FTC, many stores — including franchisees of Aaron’s, ColorTyme, and Premier Rental Purchase — spied on their customers through secret software that logged key strokes, captured screen shots, and in some cases, remotely activated the computer’s webcam to take pictures of people in their homes. Huh? Yeah, really.